Secunia Security Advisory - H-T TeaM have discovered some vulnerabilities in minimal Gallery, which can be exploited by malicious people to disclose sensitive information.
0d59c226a881c604e5f43a38443cbb045bbe228498a95965ebbd1211212f1388
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
minimal Gallery Information Disclosure Vulnerabilities
SECUNIA ADVISORY ID:
SA28391
VERIFY ADVISORY:
http://secunia.com/advisories/28391/
CRITICAL:
Moderately critical
IMPACT:
Exposure of system information, Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
minimal Gallery 0.x
http://secunia.com/product/17191/
DESCRIPTION:
H-T TeaM have discovered some vulnerabilities in minimal Gallery,
which can be exploited by malicious people to disclose sensitive
information.
1) Input passed to the "thumb" and "thumbcat" parameters in
_mg/php/mg_thumbs.php is not properly sanitised before being used.
This can be exploited to display arbitrary files through directory
traversal attacks.
2) It is possible to view certain system information returned by the
"phpinfo()" function by accessing the php_info.php script directly.
The vulnerabilities are confirmed in version 0.8. Other versions may
also be affected.
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
Restrict access to php_info.php (e.g. with ".htaccess").
PROVIDED AND/OR DISCOVERED BY:
H-T TeaM
ORIGINAL ADVISORY:
http://milw0rm.com/exploits/4902
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------